Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   16.957917] ==================================================================
[   16.957991] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.958043] Write of size 8 at addr fff00000c635ad71 by task kunit_try_catch/177
[   16.958091] 
[   16.958122] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.958200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.958224] Hardware name: linux,dummy-virt (DT)
[   16.958253] Call trace:
[   16.958274]  show_stack+0x20/0x38 (C)
[   16.958409]  dump_stack_lvl+0x8c/0xd0
[   16.958454]  print_report+0x118/0x608
[   16.958513]  kasan_report+0xdc/0x128
[   16.958557]  kasan_check_range+0x100/0x1a8
[   16.958602]  __asan_memset+0x34/0x78
[   16.958685]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.958786]  kunit_try_run_case+0x170/0x3f0
[   16.958957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.959016]  kthread+0x328/0x630
[   16.959054]  ret_from_fork+0x10/0x20
[   16.959100] 
[   16.959117] Allocated by task 177:
[   16.959167]  kasan_save_stack+0x3c/0x68
[   16.959209]  kasan_save_track+0x20/0x40
[   16.959244]  kasan_save_alloc_info+0x40/0x58
[   16.959283]  __kasan_kmalloc+0xd4/0xd8
[   16.959318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.959479]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.959660]  kunit_try_run_case+0x170/0x3f0
[   16.959831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.959954]  kthread+0x328/0x630
[   16.960053]  ret_from_fork+0x10/0x20
[   16.960163] 
[   16.960183] The buggy address belongs to the object at fff00000c635ad00
[   16.960183]  which belongs to the cache kmalloc-128 of size 128
[   16.960250] The buggy address is located 113 bytes inside of
[   16.960250]  allocated 120-byte region [fff00000c635ad00, fff00000c635ad78)
[   16.960310] 
[   16.960329] The buggy address belongs to the physical page:
[   16.960358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10635a
[   16.960408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.960527] page_type: f5(slab)
[   16.960703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.960818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.960957] page dumped because: kasan: bad access detected
[   16.961015] 
[   16.961033] Memory state around the buggy address:
[   16.961196]  fff00000c635ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.961309]  fff00000c635ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.961497] >fff00000c635ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.961665]                                                                 ^
[   16.961751]  fff00000c635ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.961890]  fff00000c635ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.961927] ==================================================================

[   16.908616] ==================================================================
[   16.908674] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.908723] Write of size 8 at addr fff00000c63cdc71 by task kunit_try_catch/177
[   16.908770] 
[   16.908802] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   16.908880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.908904] Hardware name: linux,dummy-virt (DT)
[   16.908945] Call trace:
[   16.908966]  show_stack+0x20/0x38 (C)
[   16.909012]  dump_stack_lvl+0x8c/0xd0
[   16.909061]  print_report+0x118/0x608
[   16.909297]  kasan_report+0xdc/0x128
[   16.909382]  kasan_check_range+0x100/0x1a8
[   16.909427]  __asan_memset+0x34/0x78
[   16.909468]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.910389]  kunit_try_run_case+0x170/0x3f0
[   16.910546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.910763]  kthread+0x328/0x630
[   16.910805]  ret_from_fork+0x10/0x20
[   16.910851] 
[   16.910869] Allocated by task 177:
[   16.910896]  kasan_save_stack+0x3c/0x68
[   16.910948]  kasan_save_track+0x20/0x40
[   16.910984]  kasan_save_alloc_info+0x40/0x58
[   16.911034]  __kasan_kmalloc+0xd4/0xd8
[   16.911070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.911408]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.911466]  kunit_try_run_case+0x170/0x3f0
[   16.911503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.911774]  kthread+0x328/0x630
[   16.911876]  ret_from_fork+0x10/0x20
[   16.912187] 
[   16.912211] The buggy address belongs to the object at fff00000c63cdc00
[   16.912211]  which belongs to the cache kmalloc-128 of size 128
[   16.912269] The buggy address is located 113 bytes inside of
[   16.912269]  allocated 120-byte region [fff00000c63cdc00, fff00000c63cdc78)
[   16.912330] 
[   16.912356] The buggy address belongs to the physical page:
[   16.912494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cd
[   16.912609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.912672] page_type: f5(slab)
[   16.912731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.912779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.912844] page dumped because: kasan: bad access detected
[   16.912875] 
[   16.912892] Memory state around the buggy address:
[   16.913203]  fff00000c63cdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.913660]  fff00000c63cdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.913737] >fff00000c63cdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.913774]                                                                 ^
[   16.913813]  fff00000c63cdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.913855]  fff00000c63cdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.913892] ==================================================================

[   13.485715] ==================================================================
[   13.486152] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   13.486652] Write of size 8 at addr ffff88810254d371 by task kunit_try_catch/194
[   13.487172] 
[   13.487392] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.487568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.487590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.487635] Call Trace:
[   13.487660]  <TASK>
[   13.487684]  dump_stack_lvl+0x73/0xb0
[   13.487741]  print_report+0xd1/0x650
[   13.487780]  ? __virt_addr_valid+0x1db/0x2d0
[   13.487817]  ? kmalloc_oob_memset_8+0x166/0x330
[   13.487850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.487892]  ? kmalloc_oob_memset_8+0x166/0x330
[   13.487931]  kasan_report+0x141/0x180
[   13.487968]  ? kmalloc_oob_memset_8+0x166/0x330
[   13.488004]  kasan_check_range+0x10c/0x1c0
[   13.488031]  __asan_memset+0x27/0x50
[   13.488054]  kmalloc_oob_memset_8+0x166/0x330
[   13.488080]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   13.488106]  ? __schedule+0x10cc/0x2b60
[   13.488137]  ? __pfx_read_tsc+0x10/0x10
[   13.488162]  ? ktime_get_ts64+0x86/0x230
[   13.488197]  kunit_try_run_case+0x1a5/0x480
[   13.488232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.488266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.488445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.488521]  ? __kthread_parkme+0x82/0x180
[   13.488592]  ? preempt_count_sub+0x50/0x80
[   13.488643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.488677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.488711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.488742]  kthread+0x337/0x6f0
[   13.488773]  ? trace_preempt_on+0x20/0xc0
[   13.488812]  ? __pfx_kthread+0x10/0x10
[   13.488844]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.488880]  ? calculate_sigpending+0x7b/0xa0
[   13.488920]  ? __pfx_kthread+0x10/0x10
[   13.488955]  ret_from_fork+0x116/0x1d0
[   13.488982]  ? __pfx_kthread+0x10/0x10
[   13.489013]  ret_from_fork_asm+0x1a/0x30
[   13.489065]  </TASK>
[   13.489088] 
[   13.499943] Allocated by task 194:
[   13.500279]  kasan_save_stack+0x45/0x70
[   13.500603]  kasan_save_track+0x18/0x40
[   13.500755]  kasan_save_alloc_info+0x3b/0x50
[   13.500905]  __kasan_kmalloc+0xb7/0xc0
[   13.501051]  __kmalloc_cache_noprof+0x189/0x420
[   13.501864]  kmalloc_oob_memset_8+0xac/0x330
[   13.502275]  kunit_try_run_case+0x1a5/0x480
[   13.502757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.503168]  kthread+0x337/0x6f0
[   13.503323]  ret_from_fork+0x116/0x1d0
[   13.503485]  ret_from_fork_asm+0x1a/0x30
[   13.503985] 
[   13.504171] The buggy address belongs to the object at ffff88810254d300
[   13.504171]  which belongs to the cache kmalloc-128 of size 128
[   13.504771] The buggy address is located 113 bytes inside of
[   13.504771]  allocated 120-byte region [ffff88810254d300, ffff88810254d378)
[   13.505442] 
[   13.505610] The buggy address belongs to the physical page:
[   13.505929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   13.506302] flags: 0x200000000000000(node=0|zone=2)
[   13.506544] page_type: f5(slab)
[   13.507163] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.507877] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.508219] page dumped because: kasan: bad access detected
[   13.508642] 
[   13.508823] Memory state around the buggy address:
[   13.509059]  ffff88810254d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.509345]  ffff88810254d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.509859] >ffff88810254d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.510285]                                                                 ^
[   13.511027]  ffff88810254d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.511449]  ffff88810254d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.511924] ==================================================================

[   13.648663] ==================================================================
[   13.649369] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   13.649791] Write of size 8 at addr ffff8881031c0071 by task kunit_try_catch/193
[   13.650074] 
[   13.650216] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   13.650261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.650273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.650294] Call Trace:
[   13.650306]  <TASK>
[   13.650321]  dump_stack_lvl+0x73/0xb0
[   13.650350]  print_report+0xd1/0x650
[   13.650373]  ? __virt_addr_valid+0x1db/0x2d0
[   13.650398]  ? kmalloc_oob_memset_8+0x166/0x330
[   13.650420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.650447]  ? kmalloc_oob_memset_8+0x166/0x330
[   13.650493]  kasan_report+0x141/0x180
[   13.650515]  ? kmalloc_oob_memset_8+0x166/0x330
[   13.650542]  kasan_check_range+0x10c/0x1c0
[   13.650566]  __asan_memset+0x27/0x50
[   13.650585]  kmalloc_oob_memset_8+0x166/0x330
[   13.650608]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   13.650631]  ? __schedule+0x10cc/0x2b60
[   13.650653]  ? __pfx_read_tsc+0x10/0x10
[   13.650675]  ? ktime_get_ts64+0x86/0x230
[   13.650700]  kunit_try_run_case+0x1a5/0x480
[   13.650757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.650779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.650803]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.650825]  ? __kthread_parkme+0x82/0x180
[   13.650846]  ? preempt_count_sub+0x50/0x80
[   13.650870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.650893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.650915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.650938]  kthread+0x337/0x6f0
[   13.650958]  ? trace_preempt_on+0x20/0xc0
[   13.650982]  ? __pfx_kthread+0x10/0x10
[   13.651022]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.651043]  ? calculate_sigpending+0x7b/0xa0
[   13.651078]  ? __pfx_kthread+0x10/0x10
[   13.651100]  ret_from_fork+0x116/0x1d0
[   13.651119]  ? __pfx_kthread+0x10/0x10
[   13.651140]  ret_from_fork_asm+0x1a/0x30
[   13.651172]  </TASK>
[   13.651183] 
[   13.659411] Allocated by task 193:
[   13.659608]  kasan_save_stack+0x45/0x70
[   13.659799]  kasan_save_track+0x18/0x40
[   13.660067]  kasan_save_alloc_info+0x3b/0x50
[   13.660268]  __kasan_kmalloc+0xb7/0xc0
[   13.660501]  __kmalloc_cache_noprof+0x189/0x420
[   13.660725]  kmalloc_oob_memset_8+0xac/0x330
[   13.660941]  kunit_try_run_case+0x1a5/0x480
[   13.661417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.661619]  kthread+0x337/0x6f0
[   13.661746]  ret_from_fork+0x116/0x1d0
[   13.661883]  ret_from_fork_asm+0x1a/0x30
[   13.662220] 
[   13.662324] The buggy address belongs to the object at ffff8881031c0000
[   13.662324]  which belongs to the cache kmalloc-128 of size 128
[   13.662722] The buggy address is located 113 bytes inside of
[   13.662722]  allocated 120-byte region [ffff8881031c0000, ffff8881031c0078)
[   13.663306] 
[   13.663415] The buggy address belongs to the physical page:
[   13.663672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   13.664123] flags: 0x200000000000000(node=0|zone=2)
[   13.664413] page_type: f5(slab)
[   13.664634] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   13.665089] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.665364] page dumped because: kasan: bad access detected
[   13.665697] 
[   13.665889] Memory state around the buggy address:
[   13.666145]  ffff8881031bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.666450]  ffff8881031bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.666776] >ffff8881031c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   13.667037]                                                                 ^
[   13.667299]  ffff8881031c0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.667653]  ffff8881031c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.667944] ==================================================================

[   25.787909] ==================================================================
[   25.799236] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330
[   25.806464] Write of size 8 at addr ffff88810133d471 by task kunit_try_catch/217
[   25.813864] 
[   25.815377] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   25.815386] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   25.815389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   25.815392] Call Trace:
[   25.815394]  <TASK>
[   25.815396]  dump_stack_lvl+0x73/0xb0
[   25.815400]  print_report+0xd1/0x650
[   25.815404]  ? __virt_addr_valid+0x1db/0x2d0
[   25.815408]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.815412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.815417]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.815421]  kasan_report+0x141/0x180
[   25.815425]  ? kmalloc_oob_memset_8+0x166/0x330
[   25.815430]  kasan_check_range+0x10c/0x1c0
[   25.815434]  __asan_memset+0x27/0x50
[   25.815437]  kmalloc_oob_memset_8+0x166/0x330
[   25.815441]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   25.815445]  ? __schedule+0x10cc/0x2b60
[   25.815449]  ? ktime_get_ts64+0x83/0x230
[   25.815454]  kunit_try_run_case+0x1a2/0x480
[   25.815458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.815462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.815466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.815471]  ? __kthread_parkme+0x82/0x180
[   25.815474]  ? preempt_count_sub+0x50/0x80
[   25.815478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.815483]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   25.815487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.815491]  kthread+0x334/0x6f0
[   25.815494]  ? trace_preempt_on+0x20/0xc0
[   25.815498]  ? __pfx_kthread+0x10/0x10
[   25.815502]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.815505]  ? calculate_sigpending+0x7b/0xa0
[   25.815510]  ? __pfx_kthread+0x10/0x10
[   25.815514]  ret_from_fork+0x113/0x1d0
[   25.815517]  ? __pfx_kthread+0x10/0x10
[   25.815520]  ret_from_fork_asm+0x1a/0x30
[   25.815526]  </TASK>
[   25.815528] 
[   25.984751] Allocated by task 217:
[   25.988159]  kasan_save_stack+0x45/0x70
[   25.991997]  kasan_save_track+0x18/0x40
[   25.995837]  kasan_save_alloc_info+0x3b/0x50
[   26.000110]  __kasan_kmalloc+0xb7/0xc0
[   26.003863]  __kmalloc_cache_noprof+0x189/0x420
[   26.008416]  kmalloc_oob_memset_8+0xac/0x330
[   26.012695]  kunit_try_run_case+0x1a2/0x480
[   26.016887]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   26.022288]  kthread+0x334/0x6f0
[   26.025519]  ret_from_fork+0x113/0x1d0
[   26.029272]  ret_from_fork_asm+0x1a/0x30
[   26.033198] 
[   26.034698] The buggy address belongs to the object at ffff88810133d400
[   26.034698]  which belongs to the cache kmalloc-128 of size 128
[   26.047212] The buggy address is located 113 bytes inside of
[   26.047212]  allocated 120-byte region [ffff88810133d400, ffff88810133d478)
[   26.059815] 
[   26.061313] The buggy address belongs to the physical page:
[   26.066921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d
[   26.074921] flags: 0x200000000000000(node=0|zone=2)
[   26.079800] page_type: f5(slab)
[   26.082947] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   26.090684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.098423] page dumped because: kasan: bad access detected
[   26.103996] 
[   26.105495] Memory state around the buggy address:
[   26.110289]  ffff88810133d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.117510]  ffff88810133d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.124738] >ffff88810133d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.131965]                                                                 ^
[   26.139097]  ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.146317]  ffff88810133d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.153568] ==================================================================